digital footprint; digital identity; network theory; privacy; quantification
Abstract :
[en] The digital transformation has resulted in a web of complex systems, creating a tangled mesh of context-specific digital identities for users to manage. Despite the prevalence of privacy risks, users often remain unaware of the extent to which their personal data is used by identity providers and relying parties. Drawing on design science and network analysis techniques, this paper introduces a hierarchical node architecture and data flow model to highlight the interconnectedness of partial digital identities and provides a tool to support the assessment and evaluation process. We used the developed methods to evaluate the digital footprint of ten participants, gaining insights into digital identity dynamics.
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > FINATRAX - Digital Financial Services and Cross-organizational Digital Transformations
Disciplines :
Computer science Management information systems
Author, co-author :
HÖLZMER, Pol ✱; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > FINATRAX
FRANK, Muriel-Larissa ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > FINATRAX
SCHÖNRICH-SEDLMEIR, Johannes ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > FINATRAX
Manuel Koschuch; FH Campus Wien > Research Center IT-Security
✱ These authors have contributed equally to this work.
External co-authors :
yes
Language :
English
Title :
Insights into Digital Identity Dynamics through Personal Digital Twins
Publication date :
07 January 2025
Event name :
Proceedings of the 58th Hawaii International Conference on System Sciences (HICSS), Big Island, USA
Event date :
07-10 January
Main work title :
Proceedings of the Annual Hawaii International Conference on System Sciences 2025
Publisher :
ScholarSpace
Edition :
58
Collection name :
Proceedings of the Annual Hawaii International Conference on System Sciences
Collection ISSN :
2572-6862
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Development Goals :
9. Industry, innovation and infrastructure
FnR Project :
FNR13342933 - Paypal-fnr Pearl Chair In Digital Financial Services, 2019 (01/01/2020-31/12/2024) - Gilbert Fridgen FNR16326754 - Privacy-preserving Tokenisation Of Artworks, 2021 (01/06/2022-31/05/2025) - Gilbert Fridgen
This work was funded by Luxembourg’s National
Research Fund (FNR) and PayPal (PEARL grant
ref. 13342933/Gilbert Fridgen, and PABLO grant ref.
1632675), and supported by Luxembourg’s Ministry for
Digitalisation. For open access purposes, the authors
have applied a CC BY 4.0 license to any Author Ac-
cepted Manuscript arising from this submission.
Alashoor, T., Keil, M., Smith, H. J., & McConnell, A. R. (2022). Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing. Information Systems Research.
Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Quarterly, 30(1).
Barricelli, B. R., Casiraghi, E., & Fogli, D. (2019). A Survey on Digital Twin: Definitions, Characteristics, Applications, and Design Implications. IEEE Access, 7.
Baxter, G., & Sommerville, I. (2011). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 23(1).
Bélanger, F., & Crossler, R. E. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35(4).
Bertino, E., & Takahashi, K. (2011, September). Identity Management: Concepts, Technologies, and Systems. Artech House Publishers.
Carlsson, S. A., Henningsson, S., Hrastinski, S., & Keller, C. (2011). Socio-technical IS design science research: Developing design theory for IS integration management. Information Systems and e-Business Management, 9(1).
Christl, W. (2017, June). Corporate Surveillance In Everyday Life. How Companies Collect, Combine, Analyze, Trade, and Use Personal Data on Billions (tech. rep.).
Clarke, R. (1994). The digital persona and its application to data surveillance. The Information Society, 10(2), 77-92.
Cutillo, L. A., Molva, R., & Onen, M. (2011). Analysis of Privacy in Online Social Networks from the Graph Theory Perspective. 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, 1-5.
Demirkan, H., Bess, C., Spohrer, J., Rayes, A., Allen, D., & Moghaddam, Y. (2015). Innovations with Smart Service Systems: Analytics, Big Data, Cognitive Assistance, and the Internet of Everything. Communications of the Association for Information Systems.
Gregor, S., & Hevner, A. R. (2013). Positioning and Presenting Design Science Research for Maximum Impact. MIS Quarterly.
Henry, N., & Fekete, J.-d. (2006). MatrixExplorer: A Dual-Representation System to Explore Social Networks. IEEE Transactions on Visualization and Computer Graphics, 12(5).
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. Management Information Systems Quarterly, 28(1), 75.
ITU. (2009, January). Y.2720: NGN identity management framework. Retrieved November 10, 2023, from https://handle.itu.int/11.1002/1000/9574
Jin, L., Takabi, D., & Joshi, J. (2011). Analyzing Security and Privacy Issues of Using E-mail Address as Identity. International Journal of Information Privacy, Security and Integrity, 1.
Keast, R., & Brown, K. (2005). The network approach to evaluation: Uncovering patterns, possibilities and pitfalls.
Leenes, R. E. (2007). Do They Know Me? Deconstructing Identifiability.
Lengsfeld, J. (2019). Digital Era Framework.
Liyanaarachchi, G. (2020). Online privacy as an integral component of strategy: Allaying customer fears and building loyalty. Journal of Business Strategy.
Mahraz, M.-I., Berrado, A., & Benabbou, L. (2019). A Systematic literature review of Digital Transformation.
March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision Support Systems.
McGuffin, M. J. (2012). Simple algorithms for network visualization: A tutorial. Tsinghua Science and Technology, 17(4), 383-398.
Noonan, H. (2019, February). Personal Identity (3rd edition). Routledge.
Offermann, P., Blom, S., Schönherr, M., & Bub, U. (2010). Artifact Types in Information Systems Design Science - A Literature Review. In R. Winter, J. L. Zhao, & S. Aier (Eds.), Global Perspectives on Design Science Research (pp. 77-92). Springer.
Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A Design Science Research Methodology for Information Systems Research. Journal of Management Information Systems, 24(3), 45-77.
Pfitzmann, A., & Hansen, M. (2010, August). A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management.
Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. The Journal of Applied Psychology, 88(5), 879-903.
Polonetsky, J., & Sparapani, T. (2021). A Review of the Privacy-Enhancing Technologies Software Market. IEEE Security & Privacy, 19(6), 119-122.
Roeber, B., Rehse, O., Knorrek, R., & Thomsen, B. (2015). Personal data: How context shapes consumers' data sharing with organizations from various sectors. Electronic Markets, 25(2), 95-108.
Roosendaal, A. (2010). Digital Personae and Profiles as Representations of Individuals. In M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, & G. Zhang (Eds.), Privacy and Identity Management for Life (pp. 226-236). Springer.
Sedlmeir, J., Smethurst, R., Rieger, A., & Fridgen, G. (2021). Digital identities and verifiable credentials. Business & Information Systems Engineering, 63, 603-613.
Seubert, S., & Becker, C. (2021). The Democratic Impact of Strengthening European Fundamental Rights in the Digital Age: The Example of Privacy Protection. German Law Journal, 22(1), 31-44.
Soh, S., Talaifar, S., & Harari, G. M. (2024). Identity development in the digital context. Social and Personality Psychology Compass, 18(2), e12940.
Solove, D. J. (2007, July).'I've Got Nothing to Hide' and Other Misunderstandings of Privacy.
Solove, D. J. (2020). The Myth of the Privacy Paradox. GW Law Faculty Publications & Other Works.
Stark, L., King, J., Page, X., Lampinen, A., Vitak, J., Wisniewski, P., Whalen, T., & Good, N. (2016). Bridging the Gap between Privacy by Design and Privacy in Practice. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 3415-3422.
Story, P., Smullen, D., Yao, Y., Acquisti, A., Cranor, L. F., Sadeh, N., & Schaub, F. (2021). Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proceedings on Privacy Enhancing Technologies, 2021(3), 308-333.
Sweeney, L. (2000). Simple Demographics Often Identify People Uniquely. Health, 671.
United Nations. (1948). Universal Declaration of Human Rights. Retrieved November 17, 2023, from https://www.un.org/en/about-us/universal-declaration-of-human-rights
West, D. B. (2000, January). Introduction to Graph Theory. Pearson College Div.
Westin. (2003). Social and Political Dimensions of Privacy. Journal of Social Issues, 59(2), 431-453.
Westin, A. (1968). Privacy And Freedom. Washington and Lee Law Review, 25(1), 166.
Wilson, Y., & Hingnikar, A. (2019). Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0.
Winter, R. (2008). Design science research in Europe. European Journal of Information Systems, 17(5), 470-475.